Take a good piece of double-sided velcro (that will bond to itself), about 10-20cm. Get a short, screw with a large, flat head. Put the screw through the middle of the velcro strip, and screw it onto the underside of your table, somewhere out of sight. Rinse, repeat.

Now you have velcro loops that can carry all your wires really neatly, with infinite and easy reconfigurability.

(Initially, I tried gluing / velcroing the velcro strips on. It never lasted, so I went with screws instead. That really works!)

thomasdn writes: "In this truly fascinating story, "Mr. X" — who has been working for 10 years inside the international child porn industry — gives us technical details about the architecture of the systems and the methods used for distributing child pornography.
Mr. X writes: 'Each one who has little technical knowledge will [understand] the importance and implications of this... But what I have to report to you is much more significant than this, and maybe they will finally understand to what extent the public is cheated by the greedy politicians who CANNOT DO ANYTHING against child pornography but use it as a means to justify total monitoring.'"

Alex Winston writes: "Alex Winston Ltd has developed two unique offerings that open the iPhone and iPod touch to unique possibilities. The uRemote offering is an IR antenna that plugs into the audio jack to transmit peripheral control codes through a universal remote iPhone application. The iData offering is a development kit that allows arbitrary data to be sent through the audio jack of 2nd generation iPhone and iPod to potentially control 3rd party devices or integrate with external systems. The next release of iData will offer the ability to receive data through the audio jack mic for use in iPhone or iPod Touch applications. Neither product requires a jail-broken phone and the development kits use published software libraries."

thomasdn writes: "The encryption password for a secret document relating to the war in Afghanistan has been cracked. The password is revealed on the Wikileaks website. 'NATO in Afghanistan: Master Narrative' is the title of the secret document that instructs NATO representatives on which 'story' to give journalists — and which story to avoid giving.
The document could be found in encrypted form on the Pentagon Central Command (CENTCOM) website. However, it seems that the entire site has been taken offline in response to the revelation of the password. Parts of the site can still be seen in Google's cache."

If we imagine that the hash function came only as a mathematical definition, how would your test your new implementation in LangOfTheWeek is correct?

Well, you have 2 options. One, you can prove that your program behaves, in every important way, the same as the definition. This is long, tedious work, and most programmers don't even have the necessary skills for this. Two, you can make a reference implemention in some other language, and compare the outputs.

Now, given, say, 100 programmers each working on their own functions, we should have 1 resulting behaviour. This will mean that everybody implemented the algorithm 100% correctly. However, the actual number will be between 1 and 100, depending on the skills of the programmers, and the care they've taken in implementing the functions.

Now, what's the result here? (no pun intended). It's likely to be chaos.